Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
19/11/2023, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231025-en
General
-
Target
file.exe
-
Size
267KB
-
MD5
3746ec4e33194d9d59433ee540370b98
-
SHA1
110b145c224c60a474ac596894192488f55b587a
-
SHA256
fdccf4ea45fd8aea2759fdb0c1b301ed989a6784a15778666db9b8e0e98403ca
-
SHA512
7a335f485aaf7dd08ac2f48d10d2624b74b8e26c8f6ae406afe5cac8e13566651d28bedc3b1aff4e7b9ae064fc20cfb726317fc3b385e30300602aa19d17785f
-
SSDEEP
3072:1LjOTuAZxU4oqmhZ2Qrfqw0GcSkLyphou2ukd89dohRW68H7ovbeB5:1453b4hr7l0GXkLyPz2bu9dR6wM
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1280 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 2608 tfuuucd -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tfuuucd Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tfuuucd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tfuuucd -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1864 file.exe 1864 file.exe 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found 1280 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1280 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1864 file.exe 2608 tfuuucd -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2608 2904 taskeng.exe 31 PID 2904 wrote to memory of 2608 2904 taskeng.exe 31 PID 2904 wrote to memory of 2608 2904 taskeng.exe 31 PID 2904 wrote to memory of 2608 2904 taskeng.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1864
-
C:\Windows\system32\taskeng.exetaskeng.exe {E28CD524-D38C-47EA-BC0B-019C68D3D8AD} S-1-5-21-1154728922-3261336865-3456416385-1000:TLIDUQCQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Roaming\tfuuucdC:\Users\Admin\AppData\Roaming\tfuuucd2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD53746ec4e33194d9d59433ee540370b98
SHA1110b145c224c60a474ac596894192488f55b587a
SHA256fdccf4ea45fd8aea2759fdb0c1b301ed989a6784a15778666db9b8e0e98403ca
SHA5127a335f485aaf7dd08ac2f48d10d2624b74b8e26c8f6ae406afe5cac8e13566651d28bedc3b1aff4e7b9ae064fc20cfb726317fc3b385e30300602aa19d17785f
-
Filesize
267KB
MD53746ec4e33194d9d59433ee540370b98
SHA1110b145c224c60a474ac596894192488f55b587a
SHA256fdccf4ea45fd8aea2759fdb0c1b301ed989a6784a15778666db9b8e0e98403ca
SHA5127a335f485aaf7dd08ac2f48d10d2624b74b8e26c8f6ae406afe5cac8e13566651d28bedc3b1aff4e7b9ae064fc20cfb726317fc3b385e30300602aa19d17785f